Intel offers security platform to secure critical infrastructure

Intel Security announced the Intel Security Critical Infrastructure Protection (CIP), a technology platform that could secure both legacy and new capabilities within the electric power grid. The solution is easy to use and cost effective.

Intel developed the Security CIP in association with the Department of energy funded Discovery across Texas smart grid project, including deployment at Texas Tech University and is a joint project of Intel Security and Wind River.

Intel security CIP works by separating the security management functions of the platform from the operational applications, allowing the operational layer to be robust secured, monitored and managed.

Intel security CIP can be applied with little or no changes to business processes or applications software and can be retrofitted onto many existing systems.

Intel image

A recent study found that of the 200 CIP executives surveyed globally, 32 percent had not adopted special security measures for smart grid controls. 33 percent anticipated a major cybersecurity incident within 12 months. The report said that the energy sector was adequately prepared for cyber attacks.

During the field trial at Texas Tech University from December 2013 to January 2015, it performed as required by NIST standards and withstood penetration testing.

“Traditional security measures such as patching and rebooting are often inappropriate for the grid, so we set out to design something entirely different that could be non-invasive but simultaneously robust,” said Lorie Wigle, vice president of Internet of Things security Solutions for Intel Security.

Intel security CIP includes fundamental protection building blocks such as device identity, malware protection, data protection and resiliency, tailored to today’s machine to machine environments.

In addition to power grid, Intel is offering the security technology for departments of defense, the oil and gas industry and medical applications, among other users.

[email protected]